lion-gu / ioc-explorerLinks
Explore Indicators of Compromise Automatically
☆95Updated 5 years ago
Alternatives and similar repositories for ioc-explorer
Users that are interested in ioc-explorer are comparing it to the libraries listed below
Sorting:
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 3 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 4 years ago
- 威胁检测规则集☆15Updated 6 years ago
- ☆11Updated last month
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- ☆55Updated last year
- ☆9Updated 8 years ago
- The python client of passivedns.cn☆97Updated 6 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆32Updated 5 years ago
- ☆33Updated 6 years ago
- ☆24Updated 5 years ago
- The oledump-contrib repository contains plugins and enhancements for the oledump tool published by Didier Stevens.☆54Updated 9 years ago
- 精心制作的恶意软件分析工具和资源列表A curated list of awesome malware analysis tools and resources☆42Updated 7 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆52Updated 10 years ago
- 《横向移动攻击 与检测技术》专栏文章☆17Updated 5 years ago
- Simple web shell scanner written in Golang.☆90Updated 6 years ago
- IDS Bypass tricks☆122Updated 6 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- ☆79Updated 2 years ago
- ☆38Updated last year
- Proof of Concept exploit for CVE-2017-8570☆186Updated 7 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Code snippet accompanying blog post☆30Updated 9 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 4 months ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- ☆30Updated 2 years ago